At IT Protectorate, our clients’ security comes first. Security researchers have now successfully weaponized BlueKeep (CVE-2019-0708), a name for a vulnerability Microsoft Remote Desktop. We expect hackers to start launching attacks on this vulnerability soon, if they haven’t already.

Do I need more Security Measures in place?Yes and no. Most businesses (even home users) think they are too small to be noticed. However, hackers do not discriminate. On one hand, they may target a large business with the goal of a large payout in mind. On the other, they may target thousands, even millions of PCs across the internet in an effort to use them as part of their attack vector.

So, what are some recommendations?First and foremost, IT Protectorate recommends protecting your connection to the internet with a Next-Generation firewall. A firewall will scan and block malicious traffic before it gets to your network (or leaves it!). These are not the firewalls that you can buy at Target or Walmart, mind you.Second, protect your servers and workstations with Antivirus. We make sure our clients under Maintenance Programs are covered with managed AV, which we monitor for alerts and keep updated.Third, consider cyber-security awareness training. IT Protectorate offers programs purposefully designed to trick your users into giving their credentials away to would-be hackers. Once identified, training programs are provided to give end users knowledge of key indicators which help them identify malicious emails, as well as general recommended practices to avoid data breaches, loss of funds due to falsified emails requesting payments and/or banking transfers.

Finally, know your data.

What is it worth to your family or business?

Where is it stored?

How often is it backed up?

Is it backed up to more than one location?

Without the answers to these questions, it is often complicated to perceive value from the products and service you implement to keep your data safe.

Do you offer more advanced security systems?Security software and services is a huge focus after the last several years have seen the hacking of millions of cyber-citizens’ personal and business data breached and sold on the dark web. Contact us today and we’ll assess your network and provide recommendations according to your budget. A technology road-map is helpful as it allows you to plan and budget for your technology as well as recognize the value it provides your business and its’ customers.Shameless plug: Here are some ideas and topics you may have come across that we offer or can simply answer questions about.

Darkweb Scanning

Advanced AV and Malware Detection

This deserves a blog post on it’s own—think beyond Antivirus, diagrams of the path malware traveled and files it, or the hacker accessed, stole, encrypted. This is full all-in-one prevention, detection, and resolution response.

Security Assessments

Next-Gen Firewalls

Secured Wireless with IPS/IDS

Security Awareness Training

Consulting time to put your mind at ease by simply answering questions or providing a small workshop over coffee.